Search Results - (( developing formative utilizing algorithm ) OR ( java location based algorithm ))

Search alternatives:

Refine Results
  1. 1
  2. 2

    Group formation using genetic algorithm by Che Ani, Zhamri, Husin, Mohd Zabidin, Yasin, Azman

    Published 2009
    “…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3

    Development of cell formation algorithm and model for cellular manufacturing system by Nouri, Hossein

    Published 2011
    “…Therefore, for this proposes good benchmarked algorithm, bacteria foraging algorithm is selected and developed to solve multiobjective cell formation model and traced constraints satisfaction handling to produce feasible optimal solution. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A Comparative Study on Compression of Different Image File Formats by Ooi, Poh San

    Published 1999
    “…In this project, an image compression format and algorithm has been analyses. A system has been created for user to convert or display image file format. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Performance evaluation of direction of arrival (DOA) for linear array antenna design using multiple signal classification (MUSIC) algorithm in variation of displacement vectors and... by Hamzah, Norhayati

    Published 2007
    “…The algorithm have been implemented in MATLAB software and a program was developed to investigate the power spectrum of a fixed samples, 100 with the number of elements 15 with the existence of noise. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Optimization of micro-end milling process parameters of titanium alloy using non-dominated sorting genetic algorithm by Golshan, Abolfazl

    Published 2013
    “…Response surface methodology was utilized to develop mathematical models of the process outputs. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A new correlation for oil formation volume factor of oil and gas mixture using Group Method of Data Handling; an empirical approach by Elhadi Eljezooly, Ahmad Azhari

    Published 2014
    “…In order to develop a new correlation for Bo for oil and gas mixture, Group Method of Data Handling (GMDH) algorithms has been used in this study to generate an optimum model. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Software Development For Conversion Of Ip To Wireless Atm (Watm) by Sudhakar, Swarnappa Clement

    Published 2002
    “…One of the main challenge in the design of the Wireless ATM network resides in the formation of the Wireless MAC protocol, that could handle various services with a considerable QoS and providing efficient utilization of the Wireless Channel. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A Comparative Study of Some Cellular Manufacturing Techniques by Low, W. K., Osman, M. R., M. Yusuff, Rosnah

    Published 2000
    “…Overall, Bond Energy Algorithm (BEA) was found to be the best cell formation technique.…”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Identification of Freeform Depression Feature in a Part Using Vertex Attributes From Feature Volume / Pramod S Kataraki and Mohd Salman Abu Mansor by Kataraki, Pramod S, Abu Mansor, Mohd Salman

    Published 2018
    “…The results obtained in .SAT file format show the algorithm generated feature volume, feature type and results obtained in .TXT file format show the quantitative values of features volume.…”
    Get full text
    Get full text
    Article
  18. 18

    Chaotic mutation immune evolutionary programming for photovoltaic planning in power system / Sharifah Azma Syed Mustaffa by Syed Mustaffa, Sharifah Azma

    Published 2020
    “…New automatic contingency analysis and ranking algorithm due to line and generator outages were separately developed considering the FVSI value. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Autonomous multi satellites assembly in keplerian orbits by Okasha, Mohamed Elsayed Aly Abd Elaziz, Park, Chandeok, Park, Sang-Young

    Published 2013
    “…In this paper, the guidance and control algorithms of an autonomous multiple satellite assembly are developed in a general keplerian orbit. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis